A system is disclosed for establishing a public identity for an entity on a private network. In one embodiment, a first entity can initiate a request to create a binding of a public address to a private address for itself. The existence of this public address for the first entity can be made known so that other entities can use the public address to communicate with the first entity. The present invention allows entities outside of a private network to initiate communication with an entity inside a private network.
|
8. An apparatus, comprising:
one or more processors included in a first entity in a private network and programmed to:
request to a gateway a public internet protocol (“IP”) address for the first entity;
receive a public ip address of the first entity;
receive an initial ip packet from a second entity having a public ip address, wherein the initial ip packet includes:
a destination address including the public ip address of the first entity, and
a source address including the public ip address of the second entity;
generate a responsive ip packet, wherein the responsive ip packet includes:
a destination address including the public ip address of the second entity, and
a source address including the public ip address of the first entity; and
transmit the responsive ip packet to the second entity.
1. A method for communicating between a first entity and a second entity, the method comprising:
requesting to a gateway, by the first entity in a private network, a public internet protocol (“IP”) address for the first entity;
receiving, by the first entity, a public ip address of the first entity;
receiving, at the first entity, an initial ip packet from the second entity having a public ip address, wherein the initial ip packet includes:
a destination address including the public ip address of the first entity, and
a source address including the public ip address of the second entity;
generating, at the first entity, a responsive ip packet, wherein the responsive ip packet includes:
a destination address including the public ip address of the second entity, and
a source address including the public ip address of the first entity; and
transmitting, from the first entity, the responsive ip packet to the second entity.
15. One or more non-transitory computer-readable mediums storing software instructions that, if executed by a computing device, cause the computing device to perform operations comprising:
requesting to a gateway, by a first entity in a private network, a public internet protocol (“IP”) address for the first entity;
receiving, by the first entity, a public ip address of the first entity;
receiving, at the first entity, an initial ip packet from the second entity having a public ip address, wherein the initial ip packet includes:
a destination address including the public ip address of the first entity, and
a source address including the public ip address of the second entity;
generating, at the first entity, a responsive ip packet, wherein the responsive ip packet includes:
a destination address including the public ip address of the second entity, and
a source address including the public ip address of the first entity; and
transmitting, from the first entity, the responsive ip packet to the second entity.
2. The method of
3. The method of
4. The method of
5. The method of
wherein the initial ip packet includes a media access control address for the first entity.
6. The method of
wherein the public ip address of the first entity includes a prefix associated with the subnet.
7. The method of
wherein the initial ip packet has been routed by the router according to a subnet mask of all ones.
9. The apparatus of
10. The apparatus of
11. The apparatus of
12. The apparatus of
wherein the initial ip packet includes a media access control address for the first entity.
13. The apparatus of
wherein the public ip address of the first entity includes a prefix associated with the subnet.
14. The apparatus of
wherein the initial ip packet has been routed by the router according to a subnet mask of all ones.
16. The one or more non-transitory computer-readable mediums of
17. The one or more non-transitory computer-readable mediums of
18. The one or more non-transitory computer-readable mediums of
19. The one or more non-transitory computer-readable mediums of
wherein the initial ip packet includes a media access control address for the first entity.
20. The one or more non-transitory computer-readable mediums of
wherein the public ip address of the first entity includes a prefix associated with the subnet.
21. The one or more non-transitory computer-readable mediums of
wherein the initial ip packet has been routed by the router according to a subnet mask of all ones.
|
This application is a divisional of U.S. patent application Ser. No. 10/161,573, filed on Jun. 3, 2002, the entirety of which is incorporated herein by reference. This application is also related to the following patents/applications:
DOMAIN NAME ROUTING, Hasan S. Alkhatib, U.S. Pat. No. 6,119,171;
IPNET GATEWAY, Hasan S. Alkhatib and Bruce C. Wootton, U.S. application Ser. No. 09/167,709, filed on Oct. 6, 1998; and
PSEUDO ADDRESSING, Wootton, et al., U.S. application Ser. No. 09/637,803, filed on Aug. 11, 2000.
Each of the related Patents/Applications are incorporated herein by reference.
1. Field of the Invention
The present invention is directed to technology for creating a public identity for an entity on a network.
2. Description of the Related Art
Most machines on the Internet use the Transmission Control Protocol/Internet Protocol (TCP/IP) reference model to send data to other machines on the Internet. The TCP/IP reference model includes four layers: the physical and data link layer, the network layer, the transport layer, and the application layer. The physical layer portion of the physical and data link layer is concerned with transmitting raw bits over a communication channel. The data link portion of the Physical and Data Link layer takes the raw transmission facility and transforms it into a line that appears to be relatively free of transmission errors. It accomplishes this task by having the sender break the input data up (or encapsulate) into frames, transmit the frames, and process the acknowledgment frames sent back by the receiver.
The network layer permits a host to inject packets into a network and have them travel independently to the destination. On the Internet, the protocol used for the network layer is the Internet Protocol (IP).
The transport layer is designed to allow peer entities on the source and destination to carry on a “conversation.” On the Internet, two protocols are used. The first one, the Transmission Control Protocol (TCP), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error to another machine on the Internet. It fragments the incoming byte stream into discrete packets and passes each one to the network layer. At the destination, the receiving TCP process reassembles the received packets into the output stream. TCP also handles flow control to make sure a fast sender cannot swamp a slow receiver with more packets than it can handle and manages congestion. The second protocol used in the transport layer on the Internet is the User Datagram Protocol (UDP), which does not provide the TCP sequencing or flow control. UDP is typically used for one-shot, client server type requests-reply queries for applications in which prompt delivery is more important than accurate delivery.
The transport layer is typically thought of as being above the network layer to indicate that the network layer provides a service to the transport layer. Similarly, the transport layer is typically thought of as being below the application layer to indicate that the transport layer provides a service to the application layer.
The application layer contains the high level protocols, for example, Telnet, File Transfer Protocol (FTP), Electronic Mail—Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP).
To transmit data from a source to a destination, the Internet Protocol uses an IP address. An IP address is four bytes long, and consists of a network number and a host number. When written out, IP addresses are specified as four numbers separated by dots (e.g. 198.68.70.1). Users and software applications do not always refer to hosts or other resources by their numerical IP address. Instead of using numbers, they use ASCII strings called domain names. The Internet uses a Domain Name System (DNS) to convert a domain name to an IP address.
The Internet Protocol has been in use for over two decades. It has worked extremely well, as demonstrated by the exponential growth of the Internet. Unfortunately, the Internet is rapidly becoming a victim of its own popularity: it is running out of addresses.
One proposed solution to the depleting address problem is Network Address Translation (NAT). This concept includes predefining a number of network addresses to be private addresses. The remainder of the addresses is considered global or public addresses. Public addresses are unique addresses that should only be used by one entity having access to the Internet. That is, no two entities on the Internet should have the same public address. Private addresses are not unique and are typically used for entities not having direct access to the Internet. Private addresses can be used by more than one organization or network. In the past, a private address could not be used to route on the Internet. NAT assumes that all of the machines on a network will not need to access the Internet at all times. Therefore, there is no need for each machine to have a public address. A local network can function with one or a small number of public addresses assigned to one or more gateway computers. The remainder of the machines on the network will be assigned private addresses. Since entities on the network have private addresses, the network is considered to be a private network.
When a particular machine having a private address on the private network attempts to initiate a communication with a machine outside of the private network (e.g. via the Internet), the gateway machine will intercept the communication, change the source machine's private address to a public address, change the port number and set up a table for translation between public addresses and private addresses. The table can contain the destination address, port numbers, sequencing information, byte counts and internal flags for each connection associated with a host address. Inbound packets are compared against entries in the table and permitted through the gateway only if an appropriate connection exists to validate their passage. One problem with the NAT approach is that it only works for communication initiated by a host within the private network to a host on the Internet which has a public IP address. The NAT approach specifically will not work if the communication is initiated by a host outside of the private network and is directed to a host with a private address in the private network.
Another problem is that mobile computing devices can be moved to new and different networks, including private networks. These mobile computing devices may need to be reachable so that a host outside of the private network can initiate communication with the mobile computing device. However, in this case the problem is two-fold. First, there is no means for allowing the host outside of the private network to initiate communication with the mobile computing device in the private network. Second, the host outside the private network does not know the address for the mobile computing device or the network that the mobile computing device is currently connected to.
The present invention, roughly described, pertains to a system for establishing a public identity for an entity on a network. A first entity can initiate a request to create a binding of a public address to a private address for itself. The existence of this public address for the first entity can be made known so that other entities can use the public address to communicate with the first entity. The present invention allows entities outside of a private network to initiate communication with an entity inside the private network.
One embodiment of the present invention includes a first entity electronically requesting a public address for itself. The first entity has a private address prior to requesting the public address. The first entity electronically receives and stores the public address, and communicates using the public address. In one implementation, the first entity connected to the network and received the private address for the network prior to requesting the public address.
In some embodiments, the first entity publishes its public address for other entities to find. For example, the public address can be stored in a DNS resource record or on a server connected to the Internet for purposes of storing public identities. Using the first entity's domain name, or another identifier, other entities can find the public address for the first entity and initiate communication with the first entity.
The present invention can be accomplished using hardware, software, or a combination of both hardware and software. The software used for the present invention is stored on one or more processor readable storage media including hard disk drives, CD-ROMs, DVDs, optical disks, floppy disks, tape drives, RAM, ROM or other suitable storage devices. In alternative embodiments, some or all of the software can be replaced by dedicated hardware including custom integrated circuits, gate arrays, FPGAs, PLDs, and special purpose computers.
These and other objects and advantages of the present invention will appear more clearly from the following description in which the preferred embodiment of the invention has been set forth in conjunction with the drawings.
The various components of
In one embodiment of the present invention, host A is assigned a private address from DHCP server 14 upon connection to network 10. Host A subsequently requests gateway 12 to provide host A with a public address and to bind that public address to the private address for host A. Host A subsequently publishes its new public address with server 30. Host B is a computer (or other entity) with a public IP address. Host B knows the domain name for host A; however, host B does not know an address for host A. According to the present invention, host B requests server 30 to resolve the domain name for host A. Server 30 responds to host B's request by returning the new public address for host A. Host B creates a communication for host A and sends that communication to host A using the public address received from server 30.
The present invention pertains to the creation of a binding of a public identity to a private identity for an entity on a network. For the current state of the Internet, domain names, private IP addresses and public IP addresses can be used. For other networks, protocols, configurations, situations and scenarios, identifiers other than domain names and IP addresses can be used according to the present invention. For purposes of this document, the term “address” has a broader meaning than the concept of an IP address. That is, the term “address” is used in this document to mean something that is used to locate or identify an entity or thing
Upon receiving the ACKNOWLEDGEMENT, gateway 12 will bind the public address offered to host A to the private address for host A. Additionally, local tables that need to be updated will be updated. For example, in one embodiment gateway 12 (or another entity on network 10) will maintain a table that associates IP addresses with MAC addresses (e.g. addresses of Ethernet devices). Such a table will be updated to associate the MAC address for host A with the new public IP address for host A. Other tables may also be updated, as suitable for the particular implementation. In other embodiments, gateway 12 can assign public IP addresses in a manner more similar to DHCP.
In one embodiment, host A has a domain name and one or more DNS resource records stored on the Internet according to the standard Domain Name System. One embodiment of publishing the new public IP address for host A (step 108 of
Resource records are used to resolve a domain name. A resolver process converts the domain name to an IP address. Entities that have public addresses and communicate on the Internet have a set of resource records associated with it. When a resolver process gives a domain name to the domain name system, it gets back the resource records associated with that domain name.
A resource record has five fields: domain name, time to live, class, type and value. The time to live field provides an indication of how stable the record is. Information that is highly stable is assigned a large value such as the number of seconds in a day. The third field is the class. For the Internet the class is IN. The fourth field indicates the type of resource record. One domain may have many resource records. There are at least eight types of resource records that are of interest to this discussion: SOA, A, MX, NS, CNAME, PTR, HINFO, and TXT. The value field for an SOA record provides the name of the primary source of information about the name server zone, e-mail address of its administrator, a unique serial number and various flags and time outs in the value field. The value field for an A record holds a 32 bit IP address for the host. The value field for the MX record holds the domain name of the entity willing to accept e-mail for that particular domain name. The NS record specifies name servers. The CNAME record allows aliases to be created in the value field. A PTR record points to another name in the value field, which allows look up of an IP address for a particular domain name. The value field of the HINFO record indicates the type of machine and operating system that the domain name corresponds to. An example of resource records for a host is found below in Table 1.
TABLE 1
Domain Name
Time to Live
Class
Type
Value
saturn.ttc.com
86400
IN
HINFO
Sun unix
saturn.ttc.com
86400
IN
A
188.68.70.1
saturn.ttc.com
86400
IN
MX
mars.ttc.com
Table 1 includes three resource records for an entity with a domain name of saturn.ttc.com. The first resource record indicates a time to live of 86,400 seconds (one day). The type of record is HINFO and the value indicates that the entity is a Sun workstation running the UNIX operating system. The second line is a resource record of type A, which indicates that the IP address for saturn.ttc.com is 198.68.70.1. The third line indicates that e-mail for saturn.ttc.com should be sent to mars.ttc.com. It is likely that there will also be a DNS resource record that indicates the IP address for mars.ttc.com.
The DNS name space is divided into non-overlapping zones. Each zone is some part of the Internet space and contains name servers holding the authoritative information about that zone. Normally, a zone will have one primary name server and one or more secondary name servers which get their information from the primary name server. When a resolver process has a query about a domain name, it passes the query to one of the local name servers. If the host being sought falls under the jurisdiction of that name server, then that domain name server returns the authoritative resource record. An authoritative record is one that comes from the authority that manages the record. If, however, the host is remote and no information about the requested host is available locally, the name server sends a query message to the top level name server for the host requested. The top level name server will then provide the resource records to the local name server which may cache the information and forward it to the original resolver process. Since the cached information in the local name server is not the authoritative record, the time to live field is used to determine how long to use that information. The resource records for host A can be updated by using Dynamic DNS or other protocols/methods known in the art.
Another embodiment of publishing the new public IP address for host A (step 108 of
After host A (or another entity) has published its new public identity, other entities outside of private network 10 can communicate with host A. These communications can be initiated by host A or an entity outside of private network 10. In one embodiment, communications between host A and entities outside of private network 10 are sent to each other directly using the public IP address published for host A. In other embodiments, communications between host A and entities outside of private network 10 are sent to each other via gateway 12, where gateway 12 provides a translation as described below. Note that in one embodiment, the public IP address for host A is routable to gateway 12.
In one embodiment of the process of
In another embodiment of the process of
Upon receiving the packets, host A responds to the communication from host B. This response includes creating one or more IP packets in step 312. These IP packets use the private IP address for host A as the source address. The destination address for these packets is the public IP address for host B. These packets are sent from host A using the private address for host A in step 314. The packets are received at gateway 12 in step 316. Gateway 12 translates the packets in step 318. As discussed above, the translation can include encapsulating the packets or changing the source address for the packets from the private IP address for host A to the public IP address for host A. In step 320, gateway 12 sends the packets to host B using the public address for host A as the source address. Note that in the embodiments of
In step 414, host B creates packets for host A using the received public IP address for host A as the destination address. In step 416, host B sends the created packets to host A. After receiving the IP packets, host A creates a response to host B in step 418. This response includes one more IP packets. The IP packets created by host A use the public IP address for host A as the source address. These packets created by host A are sent to host B in step 420. Host A and host B can continue to communicate with each other using steps 414-420. Note that the processes of
The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto.
Alkhatib, Hasan S, Tobagi, Fouad A
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5159592, | Oct 29 1990 | International Business Machines Corporation; INTERNATIONAL BUSINESS MACHINES CORPORATION, A CORP OF NEW YORK | Network address management for a wired network supporting wireless communication to a plurality of mobile users |
5361256, | Nov 27 1992 | International Business Machines Corporation | Inter-domain multicast routing |
5563878, | Jan 05 1995 | International Business Machines Corporation | Transaction message routing in digital communication networks |
5623605, | Aug 29 1994 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | Methods and systems for interprocess communication and inter-network data transfer |
5701427, | Sep 19 1989 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Information transfer arrangement for distributed computer system |
5717686, | Jan 21 1997 | Lockheed Martin Corporation | Cellular spacecraft TDMA communications system with call interrupt coding system for maximizing traffic throughput |
5717687, | Sep 07 1994 | U S Philips Corporation | Data communication system with adaptive routing, and switching node intended to be used in such a system |
5734651, | Jan 05 1995 | International Business Machines Corporation | Transaction message routing in digital communication networks |
5751961, | Jan 31 1996 | HANGER SOLUTIONS, LLC | Integrated internet system for translating logical addresses of internet documents to physical addresses using integrated service control point |
5754938, | Nov 29 1994 | Pinpoint Incorporated | Pseudonymous server for system for customized electronic identification of desirable objects |
5764906, | Nov 07 1995 | Francap Corporation | Universal electronic resource denotation, request and delivery system |
5777989, | Dec 19 1995 | International Business Machines Corporation; IBM Corporation | TCP/IP host name resolution for machines on several domains |
5781550, | Feb 02 1996 | Hewlett Packard Enterprise Development LP | Transparent and secure network gateway |
5790548, | Apr 18 1996 | Intellectual Ventures II LLC | Universal access multimedia data network |
5793763, | Nov 03 1995 | Cisco Technology, Inc | Security system for network address translation systems |
5805818, | Sep 11 1996 | JPMORGAN CHASE BANK, N A , AS SUCCESSOR AGENT | System for acknowledging availability of neighbor node using data packet containing data that is ordinarily fowarded to neighbor node |
5805820, | Jul 15 1996 | RPX Corporation | Method and apparatus for restricting access to private information in domain name systems by redirecting query requests |
5815664, | Mar 20 1995 | Fujitsu Limited | Address reporting device and method for detecting authorized and unauthorized addresses in a network environment |
5826014, | Feb 06 1996 | GraphOn Corporation | Firewall system for protecting network elements connected to a public network |
5856974, | Feb 13 1996 | EMC Corporaton | Internetwork address mapping gateway |
5864666, | Dec 23 1996 | TREND MICRO INCORPORATED | Web-based administration of IP tunneling on internet firewalls |
5867667, | Mar 24 1997 | Cisco Technology, Inc | Publication network control system using domain and client side communications resource locator lists for managing information communications between the domain server and publication servers |
5884038, | May 02 1997 | RPX Corporation | Method for providing an Internet protocol address with a domain name server |
5884246, | Dec 04 1996 | TRANSGATE INTELLECTUAL PROPERTIES LTD | System and method for transparent translation of electronically transmitted messages |
5889953, | May 25 1995 | CONCORD COMMUNICATIONS, INC ; Computer Associates Think, Inc | Policy management and conflict resolution in computer networks |
5897662, | Aug 18 1995 | International Business Machines Corporation | Pseudo-random address generation mechanism that reduces address translation time |
5898830, | Oct 17 1996 | GraphOn Corporation | Firewall providing enhanced network security and user transparency |
5913210, | Mar 27 1998 | PRODUCT ASSOCIATION TECHNOLOGIES, LLC | Methods and apparatus for disseminating product information via the internet |
5937162, | Apr 06 1995 | GOOGLE LLC | Method and apparatus for high volume e-mail delivery |
5937163, | Mar 26 1996 | Industrial Technology Research Institute | Method and system at a host node for hierarchically organizing the links visited by a world wide web browser executing at the host node |
6003084, | Sep 13 1996 | McAfee, LLC | Secure network proxy for connecting entities |
6006272, | Feb 23 1998 | WSOU Investments, LLC | Method for network address translation |
6032196, | Dec 13 1995 | OATH INC | System for adding a new entry to a web page table upon receiving a web page including a link to another web page not having a corresponding entry in the web page table |
6047325, | Oct 24 1997 | Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks | |
6055236, | Mar 05 1998 | Hewlett Packard Enterprise Development LP | Method and system for locating network services with distributed network address translation |
6055575, | Jan 10 1997 | ASCEND COMMUNICATIONS, INC | Virtual private network system and method |
6058431, | Apr 23 1998 | ASCEND COMMUNICATIONS, INC | System and method for network address translation as an external service in the access server of a service provider |
6061349, | Nov 03 1995 | Cisco Technology, Inc | System and method for implementing multiple IP addresses on multiple ports |
6061738, | Jun 27 1997 | D&I Systems, Inc. | Method and system for accessing information on a network using message aliasing functions having shadow callback functions |
6101543, | Oct 25 1996 | Hewlett Packard Enterprise Development LP | Pseudo network adapter for frame capture, encapsulation and encryption |
6119171, | Jan 29 1998 | HANGER SOLUTIONS, LLC | Domain name routing |
6122276, | Jun 30 1997 | Cisco Technology, Inc | Communications gateway mapping internet address to logical-unit name |
6128664, | Oct 20 1997 | Fujitsu Limited | Address-translating connection device |
6137791, | Mar 25 1997 | TELEFONAKTIEBOLAGET L M ERICSSON PUBL | Communicating packet data with a mobile station roaming within an incompatible mobile network |
6154777, | Jul 01 1996 | Oracle America, Inc | System for context-dependent name resolution |
6154839, | Apr 23 1998 | AVAYA Inc | Translating packet addresses based upon a user identifier |
6173399, | Jun 12 1997 | AVAYA Inc | Apparatus for implementing virtual private networks |
6219715, | Aug 29 1996 | Hitachi, Ltd. | Automatic address distributing system |
6226751, | Apr 17 1998 | AVAYA Inc | Method and apparatus for configuring a virtual private network |
6243749, | Oct 08 1998 | Cisco Technology, Inc | Dynamic network address updating |
6249801, | Jul 15 1998 | RADWARE LTD | Load balancing |
6266707, | Aug 17 1998 | International Business Machines Corporation | System and method for IP network address translation and IP filtering with dynamic address resolution |
6304906, | Aug 06 1998 | Hewlett Packard Enterprise Development LP | Method and systems for allowing data service system to provide class-based services to its users |
6353614, | Mar 05 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and protocol for distributed network address translation |
6353886, | Feb 04 1998 | IDPA HOLDINGS, INC | Method and system for secure network policy implementation |
6381638, | Feb 24 1999 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for options based address reuse |
6421732, | Aug 27 1998 | LONGHORN HD LLC | Ipnet gateway |
6430622, | Sep 22 1999 | International Business Machines Corporation | Methods, systems and computer program products for automated movement of IP addresses within a cluster |
6430623, | Jan 29 1998 | HANGER SOLUTIONS, LLC | Domain name routing |
6438597, | Aug 17 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and system for managing accesses to a data service system that supports persistent connections |
6438612, | Sep 11 1998 | Inside Secure | Method and arrangement for secure tunneling of data between virtual routers |
6452925, | Apr 18 1996 | Intellectual Ventures II LLC | Universal access multimedia data network |
6457061, | Nov 24 1998 | PMC-SIERRA US, INC | Method and apparatus for performing internet network address translation |
6477565, | Jun 01 1999 | YODLEE, INC | Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances |
6480508, | May 12 1999 | NETGEAR, Inc; NETGEAR HOLDINGS LIMITED, A LIMITED LIABILITY | Router-based domain name system proxy agent using address translation |
6490289, | Nov 03 1998 | Cisco Technology, Inc | Multiple network connections from a single PPP link with network address translation |
6496867, | Aug 27 1999 | Hewlett Packard Enterprise Development LP | System and method to negotiate private network addresses for initiating tunneling associations through private and/or public networks |
6507873, | Jul 08 1998 | NEC Corporation | Network address assigning system |
6510154, | Nov 03 1995 | Cisco Technology, Inc. | Security system for network address translation systems |
6523068, | Aug 27 1999 | Hewlett Packard Enterprise Development LP | Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association |
6556584, | Apr 06 1998 | NXP, B V F K A FREESCALE SEMICONDUCTOR, INC | System and method of communicating non-standardized addresses over a standardized carrier network |
6557037, | May 29 1998 | Oracle America, Inc | SYSTEM AND METHOD FOR EASING COMMUNICATIONS BETWEEN DEVICES CONNECTED RESPECTIVELY TO PUBLIC NETWORKS SUCH AS THE INTERNET AND TO PRIVATE NETWORKS BY FACILITATING RESOLUTION OF HUMAN-READABLE ADDRESSES |
6557306, | Dec 21 1999 | Hitachi, Ltd.; Hitachi Mito Engineering Co., Ltd. | Elevator apparatus for use in a building having a seismic isolation building portion and a non-seismic isolation building portion |
6591306, | Apr 01 1999 | NEC Corporation | IP network access for portable devices |
6594704, | Dec 15 1999 | Genband US LLC; SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT | Method of managing and using multiple virtual private networks in a router with a single routing table |
6618757, | May 17 2000 | AVAYA Inc | System and method for dynamic IP address management |
6629137, | Apr 26 2000 | Telefonaktiebolaget L.M. Ericsson | Network interface devices methods system and computer program products for connecting networks using different address domains through address translation |
6631416, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for enabling a tunnel between two computers on a network |
6651101, | Dec 04 1998 | Cisco Technology, Inc. | Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows |
6657991, | Dec 21 1998 | Hewlett Packard Enterprise Development LP | Method and system for provisioning network addresses in a data-over-cable system |
6662223, | Jul 01 1999 | Cisco Technology, Inc. | Protocol to coordinate network end points to measure network latency |
6697377, | Oct 21 2000 | Innomedia PTE Ltd. | Method for communicating audio data in a packet switched network |
6701437, | Apr 17 1998 | AVAYA Inc | Method and apparatus for processing communications in a virtual private network |
6708219, | Oct 26 1999 | Hewlett Packard Enterprise Development LP | Method and system for dual-network address utilization |
6722210, | Aug 31 2001 | Texas Instruments Incorporated | System and method for measuring air flow at multiple points of an air channel |
6731642, | May 03 1999 | UNILOC 2017 LLC | Internet telephony using network address translation |
6742045, | Jul 02 1999 | Cisco Technology, Inc | Handling packet fragments in a distributed network service environment |
6747979, | Oct 27 1998 | Hewlett Packard Enterprise Development LP | Method and apparatus for bridging between networks |
6754706, | Dec 16 1999 | AKAMAI TECHNOLOGIES, INC | Scalable domain name system with persistence and load balancing |
6772210, | Jul 05 2000 | Genband US LLC; SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT | Method and apparatus for exchanging communications between telephone number based devices in an internet protocol environment |
6778528, | May 17 2000 | Cisco Technology, Inc | Dial-out with dynamic IP address assignment |
6779035, | Mar 06 2000 | Microsoft Technology Licensing, LLC | Application programming interface and generalized network address translator for translation of transport-layer sessions |
6781982, | Oct 26 1999 | Hewlett Packard Enterprise Development LP | Method and system for allocating persistent private network addresses between private networks |
6832322, | Jan 29 1999 | International Business Machines Corporation | System and method for network address translation integration with IP security |
6865184, | Mar 10 2003 | Cisco Technology, Inc.; Cisco Technology, Inc | Arrangement for traversing an IPv4 network by IPv6 mobile nodes |
6948003, | Mar 15 2000 | Intellectual Ventures I LLC | Enabling a service provider to provide intranet services |
6961783, | Dec 21 2001 | JPMORGAN CHASE BANK, N A ; MORGAN STANLEY SENIOR FUNDING, INC | DNS server access control system and method |
6970941, | Dec 10 1999 | Oracle America, Inc | System and method for separating addresses from the delivery scheme in a virtual private network |
6973485, | Oct 07 1997 | Hitachi, Ltd. | Proxy server selecting server and proxy server |
6978317, | Dec 24 2003 | MOTOROLA SOLUTIONS, INC | Method and apparatus for a mobile device to address a private home agent having a public address and a private address |
6981020, | Oct 25 1995 | Genesys Telecommunications Laboratories, Inc. | Apparatus and methods for routing electronic mail in a processing center |
6982953, | Jul 11 2000 | SCORPION CONTROLS, INC | Automatic determination of correct IP address for network-connected devices |
6983319, | Apr 06 2001 | CA, INC | Dynamic port management |
6993012, | Feb 20 2001 | PALO ALTO NETWORKS, INC | Method for communicating audio data in a packet switched network |
6993595, | Dec 28 2001 | Genband US LLC; SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT | Address translation change identification |
6996628, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for managing virtual addresses for virtual networks |
6996631, | Aug 17 2000 | International Business Machines Corporation | System having a single IP address associated with communication protocol stacks in a cluster of processing systems |
7003481, | Aug 25 2000 | CALLAHAN CELLULAR L L C | Method and apparatus for providing network dependent application services |
7010702, | Jun 12 1997 | AVAYA Inc | Architecture for virtual private networks |
7028333, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for partners in virtual networks |
7028334, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for using names in virtual networks |
7032242, | Mar 05 1998 | Hewlett Packard Enterprise Development LP | Method and system for distributed network address translation with network security features |
7054322, | Aug 31 2001 | Boeing Company, the | Mobile communications network using point-to-point protocol over ethernet |
7058052, | Apr 11 2003 | Nokia Technologies Oy | System and method for using a mobile router tunneling protocol to locate functionality in a distributed architecture |
7068655, | Jun 14 2001 | Genband US LLC; SILICON VALLEY BANK, AS ADMINISTRATIVE AGENT | Network address and/or port translation |
7072337, | Jan 25 2002 | VALTRUS INNOVATIONS LIMITED | System and method for resolving network addresses for network devices on distributed network subnets |
7072935, | Apr 28 2000 | Viavi Solutions Inc | Filtering web proxy for recording web-based transactions that supports secure HTTP steps |
7085854, | Apr 12 2000 | Oracle Systems Corporation | Methods and systems for enabling communication between a processor and a network operations center |
7092390, | Sep 07 2000 | SBC Technology Resources, INC | Internal substitution bi-level addressing for compatible public networks |
7107464, | Jul 10 2001 | TELECOM ITALIA S P A | Virtual private network mechanism incorporating security association processor |
7107614, | Jan 29 1999 | TREND MICRO INCORPORATED | System and method for network address translation integration with IP security |
7110375, | Jun 28 2001 | Apple | Virtual private network identification extension |
7120676, | Apr 28 2000 | Viavi Solutions Inc | Transaction configuration system and method for transaction-based automated testing |
7120701, | Feb 22 2001 | Intel Corporation | Assigning a source address to a data packet based on the destination of the data packet |
7133368, | Feb 01 2002 | Microsoft Technology Licensing, LLC | Peer-to-peer method of quality of service (QoS) probing and analysis and infrastructure employing same |
7139828, | Aug 30 2002 | F POSZAT HU, L L C | Accessing an entity inside a private network |
7181542, | Apr 12 2000 | Oracle Systems Corporation | Method and system for managing and configuring virtual private networks |
7194553, | Oct 16 2001 | Microsoft Technology Licensing, LLC | Resolving virtual network names |
7227864, | Dec 17 2001 | Microsoft Technology Licensing, LLC | Methods and systems for establishing communications through firewalls and network address translators |
7263719, | May 15 2000 | VALTRUS INNOVATIONS LIMITED | System and method for implementing network security policies on a common network infrastructure |
7327721, | Feb 11 2002 | AVAYA LLC | Determination of endpoint virtual address assignment in an internet telephony system |
7379465, | Dec 07 2001 | RPX CLEARINGHOUSE LLC | Tunneling scheme optimized for use in virtual private networks |
7424737, | Oct 17 1996 | GraphOn Corporation | Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination |
7490151, | Oct 30 1998 | VIRNETX INC | Establishment of a secure communication link based on a domain name service (DNS) request |
7526658, | Jan 24 2003 | RPX CLEARINGHOUSE LLC | Scalable, distributed method and apparatus for transforming packets to enable secure communication between two stations |
7606191, | May 01 2006 | Sprint Spectrum LLC | Methods and systems for secure mobile-IP traffic traversing network address translation |
7609701, | Feb 22 2006 | Communication using private IP addresses of local networks | |
7653747, | Oct 16 2001 | Microsoft Technology Licensing, LLC | Resolving virtual network names |
7715380, | Jun 19 2003 | Cisco Technology, Inc. | Apparatus and methods for handling shared services through virtual route forwarding (VRF)-aware-NAT |
7787428, | Dec 05 1997 | The Distribution Systems Research Institute | Integrated information communication system |
7814228, | Feb 13 2003 | Oracle America, Inc | System and method for using data encapsulation in a virtual network |
7814541, | May 19 2006 | ARRAY NETWORKS, INC | Virtual routing for virtual local area networks having overlapping IP addresses |
7840701, | Feb 21 2007 | ARRAY NETWORKS, INC | Dynamic system and method for virtual private network (VPN) packet level routing using dual-NAT method |
7860098, | Aug 28 2006 | Cisco Technology, Inc. | Mechanisms for using NAT at a session border controller |
20010027474, | |||
20010050914, | |||
20020013848, | |||
20020026525, | |||
20020053031, | |||
20020056008, | |||
20020078198, | |||
20020091859, | |||
20020099937, | |||
20020103931, | |||
20020133534, | |||
20030018912, | |||
20030041091, | |||
20030041136, | |||
20030055978, | |||
20030065785, | |||
20030074472, | |||
20030084162, | |||
20030123421, | |||
20030131131, | |||
20030152068, | |||
20030208554, | |||
20030212795, | |||
20030219000, | |||
20040006708, | |||
20040088542, | |||
20040111612, | |||
20040148439, | |||
20040249911, | |||
20050177647, | |||
20060190607, | |||
20060195524, | |||
20060195539, | |||
20060212545, | |||
20060212599, | |||
20070286189, | |||
20080232295, | |||
20090116487, | |||
20100218254, | |||
EP817444, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jan 07 2008 | IP DYNAMICS, INC | Inpro Network Facility, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 030651 | /0836 | |
Apr 15 2011 | Impro Network Facility, LLC | (assignment on the face of the patent) | / | |||
Aug 12 2015 | Inpro Network Facility, LLC | F POSZAT HU, L L C | MERGER SEE DOCUMENT FOR DETAILS | 037490 | /0592 |
Date | Maintenance Fee Events |
Jun 24 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jun 14 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Aug 21 2023 | REM: Maintenance Fee Reminder Mailed. |
Feb 05 2024 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Jan 03 2015 | 4 years fee payment window open |
Jul 03 2015 | 6 months grace period start (w surcharge) |
Jan 03 2016 | patent expiry (for year 4) |
Jan 03 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 03 2019 | 8 years fee payment window open |
Jul 03 2019 | 6 months grace period start (w surcharge) |
Jan 03 2020 | patent expiry (for year 8) |
Jan 03 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 03 2023 | 12 years fee payment window open |
Jul 03 2023 | 6 months grace period start (w surcharge) |
Jan 03 2024 | patent expiry (for year 12) |
Jan 03 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |